Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for recognizing a user during a radio communication via the human body

a radio communication and human body technology, applied in the field of short-range wireless communication, can solve the problems of insecure cbb communication, risk of confidential code theft, tedious scheme,

Active Publication Date: 2022-11-22
ORANGE SA (FR)
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0021]Advantageously according to this mode, a service will be able to be personalized, that is to say adapted to the user who has just been recognized. For example, in the context of a domestic network, the objects of this network may act differently according to the person that requests a service (one of the members of the household) from the master device (a reading console on the domestic gateway, the television, etc.). Association of a profile with each user of the household allows simple selection of the right profile once the user of the terminal has been recognized, and makes it possible thereafter to personalize the services rendered by the objects of the local network.
[0025]By porch, or slot, is meant a portion of the signal comprising a rising edge, a falling edge and a plateau between the two, which is generated by a voluntary gesture of approach of the user. By voluntary gesture is therefore meant a part of a more complex movement of the user. For example, the movement specific to the user may consist of three taps according to a chosen temporal sequence. Each of the taps corresponds to a voluntary gesture and generates a characteristic porch in the signal. According to one embodiment of the invention, the signal is submitted for subsequent analysis only if at least one of the taps is present. It is indeed unnecessary to process the signal and proceed to identification if it corresponds to a fortuitous movement of the user. A voluntary gesture can therefore be searched for in the signal before analyzing it completely. This makes it possible in particular to avoid overloading the equipment charged with the analysis (e.g. the mobile terminal) since only voluntary gestures will be able to be submitted for subsequent recognition. On the other hand, if at least one of the porches is present, it is beneficial to continue the analysis and to detect the following porches so as to determine a characteristic curve which can be contrasted with the user's signature.
[0030]Advantageously according to this mode, the first characteristic datum, representative of the movement, is generated in a simple form corresponding to a signal comprising as many porches as voluntary gestures that the user has performed. Each elementary voluntary gesture (tap, fast approach followed by a retreat, scan, etc.) is indeed manifested by a characteristic porch in the signal obtained. Such a signal curve can be easily contrasted and compared with a reference signature of the user, established according to the same criteria.
[0034]This embodiment of the invention allows a simple implementation of a step of comparing between the characteristic datum obtained subsequent to the user's voluntary movement and the reference signature. Any type of distance calculation within the scope of the person skilled in the art will be able to be used. This distance can be conventionally compared with a predetermined threshold, or maximum acceptable distance between the two signals. As the two signals are not necessarily temporally aligned since it is not possible to control the moment at which the user initiates their movement, it is desirable to use beforehand a processing algorithm capable of taking into account and of compensating a possible shift between the signals.
[0041]Advantageously, the invention according to this functional aspect makes it possible to record a signature of the user, for subsequent identification and / or authentication, by requesting them to perform a characteristic voluntary movement in the direction of the master device several times, while keeping the portable terminal, for example their smartphone, in their pocket. The learning device is typically situated on the user's terminal but could be situated at some other location, in the network or on the master device. The user performs a natural movement or chooses to this effect a particular movement which is specific to themself, and repeats it as many times as necessary while approaching the master device (which may for example be situated in an outlet of the telecommunications operator to which the terminal is attached, or at the user's home, etc.). As was explained earlier, the shape of the signal generated and transmitted via the user's body depends on the movement, as well as on a certain number of characteristics specific to the carrier (build, age, sex, tissue moisture, etc.) and to the terminal. By exploiting several such signals, a characteristic signal (average of the input signals, signal minimizing the standard deviation of the distribution of the input signals, etc.) can be calculated, corresponding to a reliable signature of the user. It will be noted that the more signals which are obtained that are close to one another the more representative this signature is of the movement particular to the user.
[0074]Numerous details and advantages of the invention will be better understood on reading the description of a particular embodiment with reference to the appended diagrams given without limitation and in which:

Problems solved by technology

Today, however, CBB communication is not secure.
However, this scheme is tedious and presents a risk of theft of the confidential code.
However, this solution, though it avoids a fortuitous drawing closer of the receiver device, still exhibits drawbacks, since anyone who has appropriated the mobile item or is in proximity to the mobile item may perform such a gesture, that is to say that the user may be neither recognized, nor identified, nor authenticated.
If another user appropriates the terminal, on the one hand they do not have the same biometric characteristics, on the other hand they do not have any reason to know the user's voluntary movement.
They will therefore not be able to be recognized.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for recognizing a user during a radio communication via the human body
  • Method and system for recognizing a user during a radio communication via the human body
  • Method and system for recognizing a user during a radio communication via the human body

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

[0165]FIG. 5 represents the steps of a method for authenticating a user according to the invention.

[0166]In this embodiment, the user performs a voluntary movement in the direction of a master device (EPT) to validate a transaction, for example monetary. If the procedure succeeds, the user is authenticated, that is to say the latter is recognized as being the owner of the terminal.

[0167]It is assumed here, just as previously, that all the prerequisites necessary for the CBB communication have been performed in the course of the respective steps E0 and E20. It is also assumed that the learning phase described previously in support of FIG. 5 has been performed and that the user's characteristic imprint is on the mobile terminal (it is recalled that it could be located elsewhere, in a database external to the terminal). It is recalled that the voluntary movement (MV) is secret and corresponds to the user's signature (SIG) recorded in the base in analog, digital, or other form. The sign...

second embodiment

[0176]FIG. 6 represents the steps of an identification method according to the invention.

[0177]In this embodiment, the user performs a voluntary movement in the direction of a master device so as to be identified and to launch a personalized service, for example the reading of a preferred television channel. If the procedure succeeds, the user is identified, that is to say the latter is recognized as being a given user (A or B) and the corresponding service can access their profile and take appropriate action (launch channel A for A or channel B for B). For example a connected television is equipped with the master device (a CBB console) and the terminal (or the television) can access a database (or memory) comprising all the signatures of the users of the house (A, B, C, D, etc.).

[0178]It is assumed here, just as previously, that all the prerequisites necessary for the CBB communication have been performed in the course of the respective steps E0 and E20. It is also assumed that th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for recognizing a user carrying a terminal capable of receiving a radio signal coming from a device equipped with an antenna suitable for transmitting the signal. The signal is intended to be transmitted between the device and the terminal by using electromagnetic wave conduction capacities of the body of the user when at least one part of his / her body is in the vicinity of the antenna. When the user makes a characteristic movement, to move the part of his / her body close to the antenna, the device transmits a characteristic signal of the movement. The method includes: receiving a signal coming from the device; generating a characteristic datum of the movement; obtaining at least one signature; comparing the characteristic datum with the signature; and depending on the results of the comparison, recognizing the user.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This Application is a Section 371 National Stage Application of International Application No. PCT / FR2018 / 052216, filed Sep. 11, 2018, the content of which is incorporated herein by reference in its entirety, and published as WO 2019 / 063902 on Apr. 4, 2019, not in English.FIELD OF THE DISCLOSURE[0002]The invention relates to communications initiated on a short-range wireless channel. More precisely, the invention pertains to a method for implementing secure services between a handheld terminal and a device able to initiate a communication using the human body's conductivity capacity in order to transmit the carrier electromagnetic waves of such wireless communications.PRIOR ART[0003]Over the past decades, new wireless communication techniques using the human body as channel have appeared. In these technologies, grouped together under the generic term IBC (from the English: Intra-Body Communication) or else BCC (for Body Channel Communicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): H04B13/00H04W24/08
CPCH04B13/005H04W24/08H04B5/0056
Inventor LEVIONNAIS, PHILIPPELEPETIT, OLIVIERHUET, ROMAIN
Owner ORANGE SA (FR)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products